CHAPTER 2 ASSESSMENT

1. What does a seal program verify?

A. That an organization meets recognized privacy principles

B. That an organization meets recognized legal principles

C. That a third party is trusted

D. That a website does not use cookies

E. None of these is correct.

2. What techniques are used to create a list of the web pages that a computer user visits?

A. Adware, malware, and phishing

B. Malware, cookies, and web beacons

C. Web beacons, clickstreams, and spyware

D. Malware, spyware, and cookies

E. Clickstreams, cookies, and web beacons

3. Which amendment protects against unreasonable searches and seizures?

A. First

B. Third

C. Fourth

D. Fifth

E. Seventh

4. Privacy refers to a person’s right to control personal data.

A. True

B. False

5. What is the source of legal authority for the U.S. government?

A. The United States Code

B. The common law

C. Supreme Court decisions

D. The U.S. Constitution

E. The Declaration of Independence

6. Which of the following is not a privacy tort?

A. Intrusion into seclusion

B. Portrayal in a false light

C. Appropriation of likeness or identity

D. Defamation

E. Public disclosure of private facts

7. The OECD privacy protection guidelines contain ________ privacy principles.

8. Which principle means that an individual should be told the reason for data collection before the data is collected?

A. The collection limitation principle

B. The purpose specification principle

C. The use limitation principle

D. The openness principle

E. The accountability principle

9. What are the two types of cookies?

A. First-party and third-party cookies

B. Active and passive cookies

C. First-party and second-party cookies

D. Rational and irrational cookies

10. What is a web beacon?

A. Text stored on a computer user’s hard drive

B. A small, invisible electronic file

C. A pop-up advertisement

D. Executable code

E. A data trail left by a computer user

11. Employer monitoring of employees in the workplace is generally allowed.

A. True

B. False

12. To monitor telephone conversations, an employer must use equipment provided by a phone system service provider and have ________.

13. Why is biometric data unique?

A. It can be used to identify a person.

B. It is data about a person’s physical traits.

C. It can be used to commit identity theft.

D. It cannot easily be changed.

E. None of these is correct.

14. Which of the following is not a people-based privacy threat?

A. Social engineering

B. Web beacons

C. Shoulder surfing

D. Dumpster diving

E. Social networks

15. What is used to ensure privacy?

A. Biometric data

B. Encryption

C. Information security

D. Monitoring

E. Online profiling

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset